Page 496 - 《软件学报》2024年第4期
P. 496

2074                                                       软件学报  2024  年第  35  卷第  4  期


                     Machinery, 2017. 565–581. [doi: 10.1145/3132747.3132778]
                  [6]  Shekhtman L, Waisbard E. EngraveChain: A blockchain-based tamper-proof distributed log system. Future Internet, 2021, 13(6): 143.
                     [doi: 10.3390/fi13060143]
                  [7]  Liao XK, Li SS, Dong W, Jia ZY, Liu XD, Zhou SL. Survey on log research of large scale software system. Ruan Jian Xue Bao/Journal
                     of Software, 2016, 27(8): 1934−1947 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/4936.htm [doi: 10.13328/j.cnki.
                     jos.004936]
                  [8]  The Syslog Protocol. 2009. https://datatracker.ietf.org/doc/html/rfc5424
                  [9]  Chowdhury S, Di Nardo S, Hindle A, Jiang ZM. An exploratory study on assessing the energy impact of logging on Android applications.
                     Empirical Software Engineering, 2018, 23(3): 1422–1456. [doi: 10.1007/s10664-017-9545-x]
                 [10]  Zhauniarovich Y, Gadyatskaya O. Small changes, big changes: An updated view on the Android permission system. In: Proc. of the 19th
                     Int’l Symp. on Research in Attacks, Intrusions, and Defenses. Paris: Springer, 2016. 346–367. [doi: 10.1007/978-3-319-45719-2_16]
                 [11]  Elgharabawy M, Kojusner B, Mannan M, Butler KRB, Williams B, Youssef A. SAUSAGE: Security analysis of UNIX domain socket
                     usage in Android. In: Proc. of the 7th IEEE European Symp. on Security and Privacy (EuroS&P). Genoa: IEEE, 2022. 572–586. [doi: 10.
                     1109/EuroSP53844.2022.00042]
                 [12]  Fukui  D,  Shimaoka  M,  Mikami  H,  Hillenbrand  D,  Yamamoto  H,  Kimura  K,  Kasahara  H.  Annotatable  systrace:  An  extended  Linux
                     FTrace for tracing a parallelized program. In: Proc. of the 2nd Int’l Workshop on Software Engineering for Parallel Systems. Pittsburgh:
                     Association for Computing Machinery, 2015. 21–25. [doi: 10.1145/2837476.2837479]
                 [13]  Kilbury J, Bontcheva K, Samih Y. FTrace: A tool for finite-state morphology. In: Proc. of the 9th Int’l Workshop on Finite State Methods
                     and Natural Language Processing. Blois: Association for Computational Linguistics, 2011. 88–92.
                 [14]  Yang S, Park SJ, Ousterhout J. NanoLog: A nanosecond scale logging system. In: Proc. of the 2018 USENIX Annual Technical Conf.
                     Boston: USENIX Association, 2018. 335–349.
                 [15]  Gupta S. Pro Apache Log4j. 2nd ed., Berkeley: Apress, 2005.
                 [16]  Srinivasa S, Pedersen JM, Vasilomanolakis E. Deceptive directories and “vulnerable” logs: A honeypot study of the LDAP and Log4j
                     attack landscape. In: Proc. of the 2022 IEEE European Symp. on Security and Privacy Workshops (EuroS&PW). Genoa: IEEE, 2022.
                     442–447. [doi: 10.1109/EuroSPW55150.2022.00052]
                 [17]  Liu  WZ,  Tao  QY,  He  Q,  Yu  LJ.  Application  of  Log4j  in  e-commerce  services.  Applied  Mechanics  and  Materials,  2014,  635 –637:
                     1517–1521. [doi: 10.4028/www.scientific.net/AMM.635-637.1517]
                 [18]  OpenHarmony. 2009. https://gitee.com/openharmony
                 [19]  Xu YX. Research and design of high performance distributed log system. Industrial Control Computer, 2020, 33(12): 44–46 (in  Chinese
                      with  English  abstract). [doi: 10.3969/j.issn.1001-182X.2020.12.019]
                 [20]  You Y, Wang H, Ren T, Gu SH, Sun JL. Storage design of tracing-logs for application performance management system. Ruan Jian Xue
                     Bao/Journal of Software, 2021, 32(5): 1302−1321 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/6234.htm [doi: 10.
                     13328/j.cnki.jos.006234]
                 [21]  Guo  JW,  Cai  P,  Qian  WN,  Zhou  AY.  Accurate  and  efficient  follower  log  repair  for  Raft-replicated  database  systems.  Frontiers  of
                     Computer Science, 2021, 15(2): 152605. [doi: 10.1007/s11704-019-8349-0]
                 [22]  Liang GY, Wu YJ, Wu JZ, Zhao C. Open source software supply chain for reliability assurance of operating systems. Ruan Jian Xue
                     Bao/Journal of Software, 2020, 31(10): 3056−3073 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/6070.htm [doi:
                     10.13328/j.cnki.jos.006070]
                 [23]  Neira-Ayuso P, Gasca RM, Lefevre L. Communicating between the kernel and user-space in Linux using Netlink sockets. Software:
                     Practice and Experience, 2010, 40(9): 797–810. [doi: 10.1002/spe.981]
                 [24]  Shakya B, Xu XL, Tehranipoor M, Forte D. CAS-Lock: A security-corruptibility trade-off resilient logic locking scheme. IACR Trans. on
                     Cryptographic Hardware and Embedded Systems, 2020, 2020(1): 175–202. [doi: 10.13154/tches.v2020.i1.175-202]
                 [25]  Torrellas J, Lam MS, Hennessy JL. False sharing and spatial locality in multiprocessor caches. IEEE Trans. on Computers, 1994, 43(6):
                     651–663. [doi: 10.1109/12.286299]
                 [26]  Dechev D. The ABA problem in multicore data structures with collaborating operations. In: Proc. of the 7th Int’l Conf. on Collaborative
                     Computing: Networking, Applications and Worksharing (CollaborateCom). Orlando: IEEE, 2011. 158–167. [doi: 10.4108/icst.collabora
                     tecom.2011.247161]
                 [27]  China Academy of Information and Communications. White Paper of IOT. 2020 (in Chinese). http://www.caict.ac.cn/english/research/
                     whitepapers/202012/P020201223330673521178.pdf
                 [28]  Murthy S, Bakar AA, Rahim FA, Ramli R. A comparative study of data anonymization techniques. In: Proc. of the 5th IEEE Int’l Conf.
   491   492   493   494   495   496   497   498   499   500   501